Nomisec Exploits

21,368 exploits tracked across all sources.

Sort: Activity Stars
CVE-2025-2598 NOMISEC MEDIUM
AWS CDK CLI - Info Disclosure
When the AWS Cloud Development Kit (AWS CDK) Command Line Interface (AWS CDK CLI) is used with a credential plugin which returns an expiration property with the retrieved AWS credentials, the credentials are printed to the console output. To mitigate this issue, users should upgrade to version 2.178.2 or later and ensure any forked or derivative code is patched to incorporate the new fixes.
by Catnip-Express-Maxim
CVSS 5.5
CVE-2018-12533 NOMISEC CRITICAL
JBoss RichFaces 3.1.0-3.3.4 - RCE
JBoss RichFaces 3.1.0 through 3.3.4 allows unauthenticated remote attackers to inject expression language (EL) expressions and execute arbitrary Java code via a /DATA/ substring in a path with an org.richfaces.renderkit.html.Paint2DResource$ImageData object, aka RF-14310.
by LucasKatashi
1 stars
CVSS 9.8
CVE-2024-6387 NOMISEC HIGH
OpenSSH - DoS
A security regression (CVE-2006-5051) was discovered in OpenSSH's server (sshd). There is a race condition which can lead sshd to handle some signals in an unsafe manner. An unauthenticated, remote attacker may be able to trigger it by failing to authenticate within a set time period.
by arielrbrdev
CVSS 8.1
CVE-2025-13595 NOMISEC CRITICAL
CIBELES AI <1.10.8 - File Upload
The CIBELES AI plugin for WordPress is vulnerable to arbitrary file uploads due to missing capability check in the 'actualizador_git.php' file in all versions up to, and including, 1.10.8. This makes it possible for unauthenticated attackers to download arbitrary GitHub repositories and overwrite plugin files on the affected site's server which may make remote code execution possible.
by d0n601
1 stars
CVSS 9.8
CVE-2025-13597 NOMISEC CRITICAL
AI Feeds <1.0.11 - File Upload
The AI Feeds plugin for WordPress is vulnerable to arbitrary file uploads due to missing capability check in the 'actualizador_git.php' file in all versions up to, and including, 1.0.11. This makes it possible for unauthenticated attackers to download arbitrary GitHub repositories and overwrite plugin files on the affected site's server which may make remote code execution possible.
by d0n601
CVSS 9.8
CVE-2021-44228 NOMISEC CRITICAL
Log4Shell HTTP Header Injection
Apache Log4j2 2.0-beta9 through 2.15.0 (excluding security releases 2.12.2, 2.12.3, and 2.3.1) JNDI features used in configuration, log messages, and parameters do not protect against attacker controlled LDAP and other JNDI related endpoints. An attacker who can control log messages or log message parameters can execute arbitrary code loaded from LDAP servers when message lookup substitution is enabled. From log4j 2.15.0, this behavior has been disabled by default. From version 2.16.0 (along with 2.12.2, 2.12.3, and 2.3.1), this functionality has been completely removed. Note that this vulnerability is specific to log4j-core and does not affect log4net, log4cxx, or other Apache Logging Services projects.
by corelight
19 stars
CVSS 10.0
CVE-2025-62168 NOMISEC CRITICAL
Squid < 7.2 - Error Information Exposure
Squid is a caching proxy for the Web. In Squid versions prior to 7.2, a failure to redact HTTP authentication credentials in error handling allows information disclosure. The vulnerability allows a script to bypass browser security protections and learn the credentials a trusted client uses to authenticate. This potentially allows a remote client to identify security tokens or credentials used internally by a web application using Squid for backend load balancing. These attacks do not require Squid to be configured with HTTP authentication. The vulnerability is fixed in version 7.2. As a workaround, disable debug information in administrator mailto links generated by Squid by configuring squid.conf with email_err_data off.
by nehkark
CVSS 10.0
CVE-2025-63498 NOMISEC MEDIUM
alinto SOGo <5.12.3 - XSS
alinto SOGo 5.12.3 is vulnerable to Cross Site Scripting (XSS) via the "userName" parameter.
by xryptoh
1 stars
CVSS 6.1
CVE-2022-37969 NOMISEC HIGH
Microsoft Windows 10 1507 < 10.0.10240.19444 - Out-of-Bounds Write
Windows Common Log File System Driver Elevation of Privilege Vulnerability
by EmilC3978
2 stars
CVSS 7.8
CVE-2025-6389 NOMISEC CRITICAL
Sneeit Framework <8.3 - RCE
The Sneeit Framework plugin for WordPress is vulnerable to Remote Code Execution in all versions up to, and including, 8.3 via the sneeit_articles_pagination_callback() function. This is due to the function accepting user input and then passing that through call_user_func(). This makes it possible for unauthenticated attackers to execute code on the server which can be leveraged to inject backdoors or, for example, create new administrative user accounts.
by shac1x
CVSS 9.8
CVE-2025-6389 NOMISEC CRITICAL
Sneeit Framework <8.3 - RCE
The Sneeit Framework plugin for WordPress is vulnerable to Remote Code Execution in all versions up to, and including, 8.3 via the sneeit_articles_pagination_callback() function. This is due to the function accepting user input and then passing that through call_user_func(). This makes it possible for unauthenticated attackers to execute code on the server which can be leveraged to inject backdoors or, for example, create new administrative user accounts.
by aritlhq
CVSS 9.8
CVE-2025-6554 NOMISEC HIGH
Google Chrome <138.0.7204.96 - RCE
Type confusion in V8 in Google Chrome prior to 138.0.7204.96 allowed a remote attacker to perform arbitrary read/write via a crafted HTML page. (Chromium security severity: High)
by aklnjakln
30 stars
CVSS 8.1
CVE-2024-29943 NOMISEC CRITICAL
Firefox < 124.0.1 - Memory Corruption
An attacker was able to perform an out-of-bounds read or write on a JavaScript object by fooling range-based bounds check elimination. This vulnerability affects Firefox < 124.0.1.
by seadragnol
2 stars
CVSS 9.8
CVE-2025-32434 NOMISEC CRITICAL
Linuxfoundation Pytorch < 2.6.0 - Insecure Deserialization
PyTorch is a Python package that provides tensor computation with strong GPU acceleration and deep neural networks built on a tape-based autograd system. In version 2.5.1 and prior, a Remote Command Execution (RCE) vulnerability exists in PyTorch when loading a model using torch.load with weights_only=True. This issue has been patched in version 2.6.0.
by cyhe50
CVSS 9.8
CVE-2022-24992 NOMISEC HIGH
QR Code Generator < 5.2.7 - Path Traversal
A vulnerability in the component process.php of QR Code Generator v5.2.7 allows attackers to perform directory traversal.
by esistferry
CVSS 7.5
CVE-2025-2598 NOMISEC MEDIUM
AWS CDK CLI - Info Disclosure
When the AWS Cloud Development Kit (AWS CDK) Command Line Interface (AWS CDK CLI) is used with a credential plugin which returns an expiration property with the retrieved AWS credentials, the credentials are printed to the console output. To mitigate this issue, users should upgrade to version 2.178.2 or later and ensure any forked or derivative code is patched to incorporate the new fixes.
by SallyXVIII
CVSS 5.5
CVE-2025-24054 NOMISEC MEDIUM
Windows NTLM - Path Traversal
External control of file name or path in Windows NTLM allows an unauthorized attacker to perform spoofing over a network.
by Untouchable17
2 stars
CVSS 6.5
CVE-2025-65670 NOMISEC MEDIUM
classroomio <0.1.13 - Info Disclosure
An Insecure Direct Object Reference (IDOR) in classroomio 0.1.13 allows students to access sensitive admin/teacher endpoints by manipulating course IDs in URLs, resulting in unauthorized disclosure of sensitive course, admin, and student data. The leak occurs momentarily before the system reverts to a normal state restricting access.
by Rivek619
CVSS 4.3
CVE-2025-65669 NOMISEC CRITICAL
Classroomio <0.1.13 - Auth Bypass
An issue was discovered in classroomio 0.1.13. Student accounts are able to delete courses from the Explore page without any authorization or authentication checks, bypassing the expected admin-only deletion restriction.
by Rivek619
CVSS 9.1
CVE-2025-54381 NOMISEC CRITICAL
Bentoml < 1.4.19 - SSRF
BentoML is a Python library for building online serving systems optimized for AI apps and model inference. In versions 1.4.0 until 1.4.19, the file upload processing system contains an SSRF vulnerability that allows unauthenticated remote attackers to force the server to make arbitrary HTTP requests. The vulnerability stems from the multipart form data and JSON request handlers, which automatically download files from user-provided URLs without validating whether those URLs point to internal network addresses, cloud metadata endpoints, or other restricted resources. The documentation explicitly promotes this URL-based file upload feature, making it an intended design that exposes all deployed services to SSRF attacks by default. Version 1.4.19 contains a patch for the issue.
by IS8123
CVSS 9.9
CVE-2025-65681 NOMISEC LOW
Overhang.IO <20.0.2 - Info Disclosure
An issue was discovered in Overhang.IO (tutor-open-edx) (overhangio/tutor) 20.0.2 allowing local unauthorized attackers to gain access to sensitive information due to the absence of proper cache-control HTTP headers and client-side session checks.
by Rivek619
CVSS 3.3
CVE-2019-8451 NOMISEC MEDIUM
Atlassian Jira Server < 8.4.0 - SSRF
The /plugins/servlet/gadgets/makeRequest resource in Jira before version 8.4.0 allows remote attackers to access the content of internal network resources via a Server Side Request Forgery (SSRF) vulnerability due to a logic bug in the JiraWhitelist class.
by b0ul1
CVSS 6.5
CVE-2025-65676 NOMISEC MEDIUM
Classroomio LMS 0.1.13 - XSS
Stored Cross site scripting (XSS) vulnerability in Classroomio LMS 0.1.13 allows authenticated attackers to execute arbitrary code via crafted SVG cover images.
by Rivek619
CVSS 5.4
CVE-2025-65675 NOMISEC MEDIUM
Classroomio LMS 0.1.13 - XSS
Stored Cross site scripting (XSS) vulnerability in Classroomio LMS 0.1.13 allows authenticated attackers to execute arbitrary code via crafted SVG profile pictures.
by Rivek619
CVSS 5.4
CVE-2025-65672 NOMISEC HIGH
classroomio <0.1.13 - Info Disclosure
Insecure Direct Object Reference (IDOR) in classroomio 0.1.13 allows unauthorized share and invite access to course settings.
by Rivek619
CVSS 7.5